Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : Proceedings (Lecture Notes in Computer Sci

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 : Proceedings (Lecture Notes in Computer Sci

By: Shalini Urs (editor), Srinath Srinivasa (editor), Shu-Hsing Li (editor), Michael Chau (editor), G. Alan Wang (editor), Hsinchun Chen (editor)Paperback

2 - 4 weeks availability

£62.99 With FREE Saver Delivery


Intelligence and security informatics (ISI) is concerned with the study of the devel- ment and use of advanced information technologies and systems for national, inter- tional, and societal security-related applications. The annual IEEE International Conference series on ISI (http://www. isiconference. org/) was started in 2003. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in c- junction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), with over 100 contributors and participants from all over the world. This would become the start of a new series of ISI meetings in the Pacific Asia region. PAISI 2007 (http://isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China. PAISI 2008 (http://isi. se. cuhk. edu. hk/2008/) was held in Taipei, Taiwan, in conjunction with IEEE ISI 2008. PAISI 2009 (http://www. business. hku. hk/paisi/2009/) was held in Bangkok, Thailand, in conjunction with PAKDD 2009. These past ISI conferences and workshops brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics. These topics include ISI data m- agement, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr- ture security, policy studies and evaluation, information assurance, enterprise risk management, information systems security, among others.

Create a review


Terrorism Informatics and Crime Analysis.- Combined Detection Model for Criminal Network Detection.- An Association Model for Implicit Crime Link Analysis.- Design and Deployment of a National Detecting Stolen Vehicles Network System.- Fighting Cybercrime: A KM Perspective.- Transportation Infrastructure Security.- Trajectory Similarity of Network Constrained Moving Objects and Applications to Traffic Security.- An Emergent Traffic Messaging Service Using Wireless Technology.- Information Access and Security.- A Model for Detecting "Global Footprint Anomalies" in a Grid Environment.- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection.- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches.- Data Encryption.- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.- Key Independent Decryption of Graphically Encrypted Images.- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.- JPEG Steganalysis Using HBCL Statistics and FR Index.- Data and Text Mining.- Text Mining Technique for Chinese Written Judgment of Criminal Case.- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure.- Identifying Controversial Issues and Their Sub-topics in News Articles.- Efficient Privacy Preserving K-Means Clustering.- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration.

Product Details

  • publication date: 04/06/2010
  • ISBN13: 9783642136009
  • Format: Paperback
  • Number Of Pages: 183
  • ID: 9783642136009
  • weight: 295
  • ISBN10: 3642136001

Delivery Information

  • Saver Delivery: Yes
  • 1st Class Delivery: Yes
  • Courier Delivery: Yes
  • Store Delivery: Yes

Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly